Cyber-storms come from clouds

Security of cloud computing in the IoT era

Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone*, Manuel Mazzara

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

57 Downloads (Pure)

Abstract

The Internet of Things (IoT) is rapidly changing our society to a world where every "thing" is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.

Original languageEnglish
Article number127
JournalFuture Internet
Volume11
Issue number6
ISSN1999-5903
DOIs
Publication statusPublished - 1 Jun 2019

Keywords

  • Cloud computing
  • Internet of Things
  • Security

Cite this

De Donno, Michele ; Giaretta, Alberto ; Dragoni, Nicola ; Bucchiarone, Antonio ; Mazzara, Manuel. / Cyber-storms come from clouds : Security of cloud computing in the IoT era. In: Future Internet. 2019 ; Vol. 11, No. 6.
@article{e5f364094dae42ea875adb363c4c0d89,
title = "Cyber-storms come from clouds: Security of cloud computing in the IoT era",
abstract = "The Internet of Things (IoT) is rapidly changing our society to a world where every {"}thing{"} is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.",
keywords = "Cloud computing, Internet of Things, Security",
author = "{De Donno}, Michele and Alberto Giaretta and Nicola Dragoni and Antonio Bucchiarone and Manuel Mazzara",
year = "2019",
month = "6",
day = "1",
doi = "10.3390/fi11060127",
language = "English",
volume = "11",
journal = "Future Internet",
issn = "1999-5903",
publisher = "M D P I AG",
number = "6",

}

Cyber-storms come from clouds : Security of cloud computing in the IoT era. / De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola; Bucchiarone, Antonio; Mazzara, Manuel.

In: Future Internet, Vol. 11, No. 6, 127, 01.06.2019.

Research output: Contribution to journalJournal articleResearchpeer-review

TY - JOUR

T1 - Cyber-storms come from clouds

T2 - Security of cloud computing in the IoT era

AU - De Donno, Michele

AU - Giaretta, Alberto

AU - Dragoni, Nicola

AU - Bucchiarone, Antonio

AU - Mazzara, Manuel

PY - 2019/6/1

Y1 - 2019/6/1

N2 - The Internet of Things (IoT) is rapidly changing our society to a world where every "thing" is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.

AB - The Internet of Things (IoT) is rapidly changing our society to a world where every "thing" is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.

KW - Cloud computing

KW - Internet of Things

KW - Security

U2 - 10.3390/fi11060127

DO - 10.3390/fi11060127

M3 - Journal article

VL - 11

JO - Future Internet

JF - Future Internet

SN - 1999-5903

IS - 6

M1 - 127

ER -